Skip to content

Conversation

@gabrielpetry
Copy link
Contributor

@gabrielpetry gabrielpetry commented Jan 29, 2026

This PR addresses permission issues encountered when using the journalctl logger with rootless Podman. The system has been updated to force file logging instead of the default journald.

Key Changes

  • Logging: Switched from journalctl to file logging to bypass permission errors in rootless environments.
  • Configuration: Enforced strict separation between runner configurations.

Important Usage Note
For this setup to work correctly, users must now explicitly include the configuration file relevant to their runner in the command pipeline. The configurations are no longer shareable.

For Podman: ... -f podman.yml ...

For Docker: ... -f docker.yml ...

@gabrielpetry gabrielpetry changed the title Rollback opentelemetry to use file loggin Rollback to use file logger for Podman and Docker Jan 29, 2026
@gabrielpetry gabrielpetry changed the title Rollback to use file logger for Podman and Docker Force the use file logger for Podman and Docker for Open Telemetry Log Scraping Jan 29, 2026
@gabrielpetry gabrielpetry changed the title Force the use file logger for Podman and Docker for Open Telemetry Log Scraping Fix rootless Podman logging and enforce runner-specific configuration Jan 29, 2026
security_opt:
- label=disable
volumes:
- ${XDG_RUNTIME_DIR}/podman/podman.sock:/var/run/docker.sock:Z
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not against it, but the issue with this is this always assumes rootless, and will break for rootfull podman, /run/podman/podman.sock

and since podman compose breaks at nested substitution, ${PODMAN_SOCK:-${XDG_RUNTIME..... we can't do either : (

- label=disable
volumes:
- ${XDG_RUNTIME_DIR}/podman/podman.sock:/var/run/docker.sock:Z
- ${HOME}/.local/share/containers/storage/overlay-containers:/hostfs/storage:Z
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same for this


### Docker/Podman Compose

When deploying with Podman, it is required to enable the user-level Podman socket with `systemctl --user enable --now podman.socket`. Note that `sudo` is not used, as it should be enabled at the user level.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ah so we are enforcing rootless podman?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants